Is My Computer Being Monitored?
Computers are great surveillance tools. Why? Well, first, it’s because manufacturers install a camera and microphone on most computers. Second, the work we do on them, both professional and personal, generates powerful information. For example, spyware on your computer can collect your keystrokes and other activity, thus revealing sensitive passwords to valuable accounts. Imagine the financial, trade secret, and other confidential information someone would have if they were recording your keystrokes.
Additionally, since most computers are connected to the internet, it’s is easy for you to unknowingly send the information to a cybercriminal anywhere in the world.
Computer Counter Surveillance Services
If you have reason to believe you are being monitored, digital counter surveillance services can help. How does it work?
First, we search for all types of intrusions on a computer, including surveillance, spyware, Malware, and more. To do this, we begin with a forensic collection of all hard drives. Then we extract all active data on the computer in addition to recovering as much deleted data as possible.
Next, we begin the serious work. We use software, tools, and analysis to identify all intrusion, threats, and surveillance risks on the computer. As we identify and capture this information, we apply chain of custody information so the evidence you can authenticate and use it in a criminal or civil legal case.
True Story: Monitored via Computer by Spouse
Without a doubt, divorce is generally painful and difficult. Consider this case from San Francisco, CA:
In this contentious divorce, during divorce negotiations, the wife began to suspect that she her husband was spying on her. Her lawyers contacted our office and we mailed our Remote Collection Unit. Using our computer forensics, we analyzed the MacBook Pro laptop from her desk. We quickly discovered someone had installed a program to take screenshots of the computer screen every five seconds.
We found over 16,000 screenshots on the computer! These included emails, documents, photos, websites, and videos that our client had viewed on the computer. Worst of all, the software forwarded this information to her husband regularly, each day. In this case, her husband was trying to get a better settlement by view his wife’s private communications, including the privileged ones with her attorney.
Fortunately, we were able to quickly disable the spying app and secure all evidence of husband’s malfeasance for use in court.
If We Discover Your Computer is Being Monitored
When we discover surveillance, we consult with you to determine next steps. Such as: immediately contacting the police; removing the threat; securing the evidence; leaving the threat in place to gather additional information; or securing the computer in our evidence vault.
As a separate service, we also analyze the computer user’s email account for such risks and threats such as email forwarding, unsecured email account settings, and unsafe emails or email attachments.